Setting up VLANs & VRF on a Cisco Catalyst 9200POE+

VLANs act as logical segmentation within our network, letting us group our device(s) based on their functionality or department requirements. In this lab, we’ll use the following VLANs: Entering Configuration Mode Once logged in via terminal, enter privileged exec mode by typing: Create the VLANs Once we’ve entered configuraiton mode we can create each VLAN […]

Read more

TCP/IP and OSI layers

Both the OSI and TCP/IP models provide a framework for understanding networking, there are some key differences, between them. The OSI Model has seven distinct layers, and is more theoretical and structured while the TCP/IP framework is more practical and streamlined, with four layers and is used in actual networking as opposed to being a […]

Read more

Network Scanning with Nmap

Nmap is a powerful tool for network exploration and security auditing. It can be used for various tasks, such as host discovery, port scanning, OS detection, and vulnerability detection. In this guide, we’ll do a simple penetration test to find vulnerabilties on our test network 192.168.0.1. We don’t have any IPS / Intrusion Prevention System […]

Read more

Automating CIS Compliance With OpenScap on Ubuntu Server

OpenScap is a tool that allows you to scan and audit your system for compliance with various security standards, such as CIS (Center for Internet Security) benchmarks. In this blog post, we will use OpenScap to deploy CIS standards on Ubuntu Server 23.04, the same steps can be used with other flavors of Linux such […]

Read more

How to Protect Yourself from Outlook Vulnerability CVE-2023-29325

CVE-2023-29325 is a critical vulnerability that could allow attackers to execute malicious code on your computer through an exploit in Outlook. Microsoft has released a security update to fix this flaw as part of its May 2023 Patch Tuesday. What is CVE-2023-29325 and how does it work? CVE-2023-29325 is a remote code execution (RCE) vulnerability that […]

Read more

How to protect yourself from Windows NFS vulnerability CVE-2023-24941

CVE-2023-29325 is a critical vulnerability that could allow attackers to execute malicious code on your computer through an exploit in Outlook. Microsoft has released a security update to fix this flaw as part of its May 2023 Patch Tuesday. What is CVE-2023-29325 and how does it work? CVE-2023-29325 is a remote code execution (RCE) vulnerability that […]

Read more

VMWare ESXI Step-By-Step installation guide

VMWare ESXi is a powerful virtualization platform that enables users to create and manage multiple virtual machines on a single physical server. The platform provides a variety of features and capabilities, including resource management, security, and high availability. This blog gives an overall guide, from verifying hardware compatibility to creating virtual machines on the VMWare […]

Read more

How to Create ESXi Installation Media with Rufus

Are you planning to deploy ESXi on your server or computer system? To get started, you’ll need a bootable USB drive or CD/DVD with the ESXi installation media or ISO file. Rufus is a free and open-source tool for creating bootable USB drives. It is easy to use and supports various operating systems and installation […]

Read more